Packet Threat Analysis

Everyone needs to do some housekeeping at different points, and I figured it was time I did some a basic security sweep of my setup. To get started, I performed a quick packet capture on the very server that hosts this blog. I decided to give one of CloudShark's newer and more distinct features a spin with my recently created account; their Threat Assessment tool. I thought it would be interesting to pit this against PacketTotal as well. These are both great tools with similar, but also different purposes. At the time, I had SSH and web ports open along with a few other unused ports for various common services. The only true security measure in place was a few basic iptables rules. CloudShark What I Liked: Up front, quick severity level rating dashboard Brief descriptions of issues which helps puts everything in laymen's terms World map view Privacy settings External references to source data and additional information Ability to view the...
Read More

Cisco Meraki Security Appliance

Note: I apologize for the loss of the screen shots. When I transferred my blog host the images were lost and I did not yet have a backup copy. Being that I actually enjoy networking and it's not just a job, I like to explore new and different technologies. I also like to continue to learn and branch into areas where I'm not as comfortable. One of these areas being firewalls. In my personal life, I have typically used my home routers with their built-in firewall capabilities (though I have my eye on Sophos). Professionally, I have had very limited experience with Cisco ASAs and Bluecoat devices. However, I recently became aware of a free trial program provided by Cisco Meraki (more info here). I found that I fulfilled the requirements and decided that a little learning couldn't hurt, so I signed up for the webinar. A short time later the trial appliance arrived. Before I let my coworkers in on...
Read More